Multi-sensor information fusion based on machine learning for real applications in human activity recognition: State-of-the-art and research challenges

S Qiu, H Zhao, N Jiang, Z Wang, L Liu, Y An, H Zhao… - Information …, 2022 - Elsevier
This paper firstly introduces common wearable sensors, smart wearable devices and the key
application areas. Since multi-sensor is defined by the presence of more than one model or …

A survey of privacy vulnerabilities of mobile device sensors

P Delgado-Santos, G Stragapede, R Tolosana… - ACM Computing …, 2022 - dl.acm.org
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …

[HTML][HTML] Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Robust natural language processing: Recent advances, challenges, and future directions

M Omar, S Choi, DH Nyang, D Mohaisen - IEEE Access, 2022 - ieeexplore.ieee.org
Recent natural language processing (NLP) techniques have accomplished high
performance on benchmark data sets, primarily due to the significant improvement in the …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Stationary mobile behavioral biometrics: A survey

A Ray-Dowling, D Hou, S Schuckers - Computers & Security, 2023 - Elsevier
Current security mechanisms in mobile devices such as PINs, passwords, patterned
passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …

DAKOTA: sensor and touch screen-based continuous authentication on a mobile banking application

ÖD Incel, S Günay, Y Akan, Y Barlas, OE Basar… - IEEE …, 2021 - ieeexplore.ieee.org
Authenticating a user in the right way is essential to IT systems, where the risks are
becoming more and more complex. Especially in the mobile world, banking applications are …

DeFFusion: CNN-based continuous authentication using deep feature fusion

Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and
privacy issues have been major concerns of smartphone users. In this article, we present …

Deep learning-based continuous authentication for an IoT-enabled healthcare service

AK Sahu, S Sharma, R Raja - Computers and Electrical Engineering, 2022 - Elsevier
Abstract The Internet of Things (IoT) has introduced a new dimension to the Internet in the
last decade; nonetheless, security, particularly attacks on authentication, continue to be a …

[HTML][HTML] Privacy-preserving sensor-based continuous authentication and user profiling: a review

L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a
fundamental aspect for protecting our personal and professional information. Authentication …